Rated 4 out of 5 by SecConsultant724 Now we are able to inspect full SSL traffic. Valuable Features:* Granular security policy* Ability to use as a Forward or Reverse Proxy* ICAP integration, high performance SSL* High performance web acceleration* Integrates well with other vendorsImprovements to My Organization:The ProxySG allowed us to inspect full SSL traffic now without breaking a sweat. No more outages due to capacity, or DDoS.Room for Improvement:Blue Coat advertises the ProxySG as a WAF, but it really isn’t. I would like the ProxySG to have full WAF features that will detect XSS, SQLi, CSFR, etc.Use of Solution:I've used it for over 10 years.Deployment Issues:The policy is very complex, and their CPL code requires some time to learn it. Once it was inpProduction, no issues were encountered with the migration.Stability Issues:The ProxySG is a strong workhorse when compared to other proxy vendors.Scalability Issues:We had a load balancer in front of the ProxySG’s. But for customers who do not have a load balancer, they may run into scalability issues.Customer Service:Blue Touch support is top notch and very responsive when I opened service requests.Technical Support:Their support engineers are very knowledgeable of the products. I never had to get my service request escalated because it was immediately solved every time.Previous Solutions:We previously used Network Appliance NetCache proxies, but Blue Coat acquired the NetCache series and phased it out. We reviewed a NetCache replacement and it was determined the ProxySG was the better candidate for use.Initial Setup:It was somewhat complex at first, but was able to migrate successfully because of rigorous testing before going into production.Implementation Team:It was implemented in-house.Other Solutions Considered:Blue Coat products are very expensive, but definitely worth a comparative analysis when choosing a proxy replacement. We looked at NetScaler, F5, and WebSense. Incorporating either one of those vendors required a full re-architecture of our front end which was not an option due to our complex network architecture.Other Advice:Be sure to get the proper sized appliance, better to be over than undersized just in case of spikes in your network.Disclaimer: I am a real user, and this review is based on my own experience and opinions. January 25, 2016

Rated 4 out of 5 by Nuo Xu We were able to monitor users' social media behavior and control certain activities, but the GUI needs updating. Valuable Features:* URL Filtering* SSL Decryption* Application and Activity Filtering* Media Streaming OptimizationImprovements to My Organization:We were able to monitor users' social media behavior and control certain activities to be allowed on the social media. This helped to prevent data loss and other activities that could result in a negative impact to the organization.URL Filtering provides both category filtering and customized filtering, which provides us with a lot of flexibility.Room for Improvement:The GUI works, but could be better. It is 2015 and I don't want to be stuck in 1999. Just saying.Disclaimer: I am a real user, and this review is based on my own experience and opinions. August 25, 2015

Rated 4 out of 5 by InfoSecAdmin964 ?It's a great solution for high load enterprise infrastructure, but it can be complex to customize the setup. Valuable Features:The anti-phishing attack features. It's very important feature in Eastern Europe to protect our users from phishing attacks by malicious web sources.Improvements to My Organization:After implementation, there has been much less malicious actions from the internet and it has reduced the scope of APT attack vectors from the web.Room for Improvement:They need to improve the intellectual analysis for APT vectors from web.Use of Solution:I've been using it for three years.Deployment Issues:It's easily deployed, but it takes time for adjustment (like any other similar product).Stability Issues:It's a very stable product.Scalability Issues:Great scalability.Customer Service:6/10.Technical Support:6/10.Previous Solutions:It was our first full-scale enterprise solution.Initial Setup:It was a complex setup because we had to do custom adjustments, but the product is very flexible for that.Implementation Team:It was done in-house.Cost and Licensing Advice:It offers unlimited count for licenses.Other Solutions Considered:We specifically chose this product as it's the industry standard.Other Advice:It's a great solution for high load enterprise infrastructure to protect company networks from web threats.Disclaimer: I am a real user, and this review is based on my own experience and opinions. June 16, 2015